Source: C:\Program Files\Common Files\System\symsrv.dll |
Avira: detection malicious, Label: TR/Floxif.BB |
Source: C:\Program Files\Common Files\System\symsrv.dll |
ReversingLabs: Detection: 100% |
Source: m6tly2Aqw4.exe |
ReversingLabs: Detection: 92% |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 100.0% probability |
Source: C:\Program Files\Common Files\System\symsrv.dll |
Joe Sandbox ML: detected |
Source: m6tly2Aqw4.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Directory created: C:\Program Files\Common Files\System\symsrv.dll |
Jump to behavior |
Source: Yara match |
File source: 0.2.m6tly2Aqw4.exe.10000000.3.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: C:\Program Files\Common Files\System\symsrv.dll, type: DROPPED |
Source: m6tly2Aqw4.exe, 00000000.00000003.2074705008.00000000015A4000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://5isohu.com/ |
Source: m6tly2Aqw4.exe |
String found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q |
Source: m6tly2Aqw4.exe |
String found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t |
Source: m6tly2Aqw4.exe |
String found in binary or memory: http://ocsp.comodoca.com0 |
Source: m6tly2Aqw4.exe, 00000000.00000003.2074705008.00000000015A4000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://www.aieov.com/ |
Source: m6tly2Aqw4.exe, 00000000.00000003.2074705008.00000000015A4000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: http://www.aieov.com/# |
Source: 0.2.m6tly2Aqw4.exe.10000000.3.unpack, type: UNPACKEDPE |
Matched rule: Detects Floxif Malware Author: Florian Roth |
Source: 0.2.m6tly2Aqw4.exe.10000000.3.unpack, type: UNPACKEDPE |
Matched rule: Detects FloodFix Author: ditekSHen |
Source: C:\Program Files\Common Files\System\symsrv.dll, type: DROPPED |
Matched rule: Detects Floxif Malware Author: Florian Roth |
Source: C:\Program Files\Common Files\System\symsrv.dll, type: DROPPED |
Matched rule: Detects FloodFix Author: ditekSHen |
Source: m6tly2Aqw4.exe |
Static PE information: section name: |
Source: m6tly2Aqw4.exe |
Static PE information: section name: |
Source: m6tly2Aqw4.exe |
Static PE information: section name: |
Source: m6tly2Aqw4.exe |
Static PE information: section name: |
Source: m6tly2Aqw4.exe |
Static PE information: section name: |
Source: m6tly2Aqw4.exe |
Static PE information: section name: |
Source: Joe Sandbox View |
Dropped File: C:\Program Files\Common Files\System\symsrv.dll DE055A89DE246E629A8694BDE18AF2B1605E4B9B493C7E4AEF669DD67ACF5085 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: String function: 006E8EEC appears 77 times |
|
Source: m6tly2Aqw4.exe, 00000000.00000003.2074705008.00000000015A0000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: originalfilename cintanotes.exe 6 vs m6tly2Aqw4.exe |
Source: m6tly2Aqw4.exe, 00000000.00000002.2122138799.00000000006AF000.00000080.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenamecintanotes.exe6 vs m6tly2Aqw4.exe |
Source: m6tly2Aqw4.exe, 00000000.00000002.2124690859.000000001002F000.00000004.00000001.01000000.00000004.sdmp |
Binary or memory string: OriginalFilenameLanguagePack vs m6tly2Aqw4.exe |
Source: m6tly2Aqw4.exe, 00000000.00000003.2074648577.0000000003AC0000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameLanguagePack vs m6tly2Aqw4.exe |
Source: m6tly2Aqw4.exe |
Binary or memory string: OriginalFilenamecintanotes.exe6 vs m6tly2Aqw4.exe |
Source: m6tly2Aqw4.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: 0.2.m6tly2Aqw4.exe.10000000.3.unpack, type: UNPACKEDPE |
Matched rule: MAL_Floxif_Generic date = 2018-05-11, author = Florian Roth, description = Detects Floxif Malware, score = de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.m6tly2Aqw4.exe.10000000.3.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_FloodFix author = ditekSHen, description = Detects FloodFix |
Source: C:\Program Files\Common Files\System\symsrv.dll, type: DROPPED |
Matched rule: MAL_Floxif_Generic date = 2018-05-11, author = Florian Roth, description = Detects Floxif Malware, score = de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: C:\Program Files\Common Files\System\symsrv.dll, type: DROPPED |
Matched rule: MALWARE_Win_FloodFix author = ditekSHen, description = Detects FloodFix |
Source: m6tly2Aqw4.exe |
Static PE information: Section: ZLIB complexity 1.0001057103737114 |
Source: m6tly2Aqw4.exe |
Static PE information: Section: ZLIB complexity 0.9927026098901099 |
Source: classification engine |
Classification label: mal100.troj.evad.winEXE@1/1@0/0 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
File created: C:\Program Files\Common Files\System\symsrv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: m6tly2Aqw4.exe |
ReversingLabs: Detection: 92% |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
File read: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Section loaded: msimg32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Section loaded: wtsapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Section loaded: ws2help.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Section loaded: shfolder.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Directory created: C:\Program Files\Common Files\System\symsrv.dll |
Jump to behavior |
Source: m6tly2Aqw4.exe |
Static PE information: More than 223 > 100 exports found |
Source: m6tly2Aqw4.exe |
Static file information: File size 4594535 > 1048576 |
Source: m6tly2Aqw4.exe |
Static PE information: Raw size of is bigger than: 0x100000 < 0x1a9200 |
Source: m6tly2Aqw4.exe |
Static PE information: Raw size of .textTh is bigger than: 0x100000 < 0x1fca00 |
Source: symsrv.dll.0.dr |
Static PE information: real checksum: 0x0 should be: 0x1f436 |
Source: m6tly2Aqw4.exe |
Static PE information: real checksum: 0x457c41 should be: 0x4658e3 |
Source: m6tly2Aqw4.exe |
Static PE information: section name: |
Source: m6tly2Aqw4.exe |
Static PE information: section name: |
Source: m6tly2Aqw4.exe |
Static PE information: section name: |
Source: m6tly2Aqw4.exe |
Static PE information: section name: |
Source: m6tly2Aqw4.exe |
Static PE information: section name: |
Source: m6tly2Aqw4.exe |
Static PE information: section name: |
Source: m6tly2Aqw4.exe |
Static PE information: section name: .textTh |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006FF020 push ecx; mov dword ptr [esp], edx |
0_2_006FF022 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006EC0AC push 006EC1C8h; ret |
0_2_006EC1C0 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006FE0A4 push ecx; mov dword ptr [esp], ecx |
0_2_006FE0A9 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006F3168 push ecx; mov dword ptr [esp], edx |
0_2_006F316D |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006EB148 push 006EB199h; ret |
0_2_006EB191 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006FB1F8 push 006FB258h; ret |
0_2_006FB250 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006FB2AE push 006FB3C4h; ret |
0_2_006FB3BC |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006FC349 push esp; ret |
0_2_006FC351 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006EB43C push 006EB468h; ret |
0_2_006EB460 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006EB402 push 006EB430h; ret |
0_2_006EB428 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_0070369F push 007036E3h; ret |
0_2_007036DB |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_007038D4 push 00703900h; ret |
0_2_007038F8 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_00703890 push 007038BCh; ret |
0_2_007038B4 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_0070292C push ecx; mov dword ptr [esp], edx |
0_2_00702931 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006FC9FA push esp; retf 006Fh |
0_2_006FCA09 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006FCA28 push esp; retf 006Fh |
0_2_006FCA29 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006F3A0A push 006F3A7Bh; ret |
0_2_006F3A73 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006FBB60 push 006FBBADh; ret |
0_2_006FBBA5 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006ECB34 pushad ; retf |
0_2_006ECB35 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006FCB1C push ecx; mov dword ptr [esp], edx |
0_2_006FCB21 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_00701B04 push ecx; mov dword ptr [esp], edx |
0_2_00701B06 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006EBBD4 push 006EBC00h; ret |
0_2_006EBBF8 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006F3B8E push 006F3BBCh; ret |
0_2_006F3BB4 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_00702C56 push 00702D03h; ret |
0_2_00702CFB |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006EBC54 push 006EBC80h; ret |
0_2_006EBC78 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006EBC1A push 006EBC48h; ret |
0_2_006EBC40 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006FACBE push 006FAD3Dh; ret |
0_2_006FAD35 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006E7CB0 push eax; ret |
0_2_006E7CEC |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006EBD5D push 006EBD88h; ret |
0_2_006EBD80 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_00702D08 push 00702D98h; ret |
0_2_00702D90 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Code function: 0_2_006FCD10 push ecx; mov dword ptr [esp], edx |
0_2_006FCD15 |
Source: m6tly2Aqw4.exe |
Static PE information: section name: entropy: 7.999484842813451 |
Source: m6tly2Aqw4.exe |
Static PE information: section name: entropy: 7.986548844569612 |
Source: m6tly2Aqw4.exe |
Static PE information: section name: entropy: 7.965397455300278 |
Source: initial sample |
Static PE information: section name: UPX0 |
Source: initial sample |
Static PE information: section name: UPX1 |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
File created: C:\Program Files\Common Files\System\symsrv.dll |
Jump to dropped file |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Registry value created: RequireSignedAppInit_DLLs 0 |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Windows AppInit_DLLs |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Windows LoadAppInit_DLLs |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Dropped PE file which has not been started: C:\Program Files\Common Files\System\symsrv.dll |
Jump to dropped file |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe TID: 2716 |
Thread sleep count: 289 > 30 |
Jump to behavior |
Source: m6tly2Aqw4.exe, 00000000.00000002.2122169113.00000000006E5000.00000040.00000001.01000000.00000003.sdmp |
Binary or memory string: VBoxService.exe |
Source: m6tly2Aqw4.exe, 00000000.00000002.2122169113.000000000078E000.00000040.00000001.01000000.00000003.sdmp |
Binary or memory string: ~VirtualMachineTypes |
Source: m6tly2Aqw4.exe, 00000000.00000002.2122169113.000000000078E000.00000040.00000001.01000000.00000003.sdmp |
Binary or memory string: ]DLL_Loader_VirtualMachine |
Source: m6tly2Aqw4.exe, 00000000.00000002.2122169113.00000000006E5000.00000040.00000001.01000000.00000003.sdmp |
Binary or memory string: VMWare |
Source: m6tly2Aqw4.exe, 00000000.00000002.2122169113.000000000078E000.00000040.00000001.01000000.00000003.sdmp |
Binary or memory string: DLL_Loader_Marker]DLL_Loader_VirtualMachineZDLL_Loader_Reloc_Unit |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Users\user\Desktop\m6tly2Aqw4.exe |
Process token adjusted: Debug |
Jump to behavior |